7.5
CVSSv3

CVE-2018-3760

Published: 26/06/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 7.6

redhat cloudforms 4.6

redhat enterprise linux 6.7

redhat enterprise linux 7.0

redhat enterprise linux 7.3

redhat enterprise linux 7.4

redhat enterprise linux 6.0

redhat enterprise linux 7.5

redhat cloudforms 4.5

sprockets project sprockets

sprockets project sprockets 4.0.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #901913 CVE-2018-3760 Package: ruby-sprockets; Maintainer for ruby-sprockets is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-sprockets is src:ruby-sprockets (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: We ...
Synopsis Important: CloudForms 464 security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update is now available for CloudForms Management Engine 59Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scor ...
Synopsis Important: rh-ror50-rubygem-sprockets security update Type/Severity Security Advisory: Important Topic An update for rh-ror50-rubygem-sprockets is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnera ...
Synopsis Important: rh-ror42-rubygem-sprockets security update Type/Severity Security Advisory: Important Topic An update for rh-ror42-rubygem-sprockets is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnera ...
Synopsis Important: CloudForms 455 security, bug fix and enhancement update Type/Severity Security Advisory: Important Topic An update is now available for CloudForms Management Engine 58Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
There is an information leak vulnerability in Sprockets Versions Affected: 400beta7 and lower, 371 and lower, 2124 and lower Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production All users running an affected rel ...

Github Repositories

1 Ruby on Rails 路径穿越与任意文件读取漏洞(CVE-2018-3760) python cve-2018-360py ip

1 Ruby on Rails 路径穿越与任意文件读取漏洞(CVE-2018-3760) python cve-2018-360py ip

Ruby On Rails Path Traversal Vulnerability(CVE-2018-3760) 中文版本(Chinese version) Ruby On Rails is a well-known Ruby Web development framework, which uses Sprockets as a static file server in development environment Sprockets is a Ruby library that compiles and distributes static resource files There is a path traversal vulnerability caused by secondary decoding in

1 Ruby on Rails 路径穿越与任意文件读取漏洞(CVE-2018-3760) python cve-2018-360py ip

1 Ruby on Rails 路径穿越与任意文件读取漏洞(CVE-2018-3760) python cve-2018-360py ip

A personal list of various resources for those who are interested in learning about infosec and hacking and keeping themselves up to date. This is by no means a complete nor fresh list, but I occasionally add entries to lists.

A bookmark index of useful tools, articles and cheat-sheets useful for various types of projects Interesting writings and articles: WEB: PHP PHP File Inclusion tips websecwordpresscom/2010/02/22/exploiting-php-file-inclusion-overview/ Using PHP filter:// for LFI: wwwidontplaydartscom/2011/02/using-php-filter-for-local-file-inclusion/ PHP RFI using data://

Rails Asset Pipeline Directory Traversal Vulnerability

CVE-2018-3760 Rails Asset Pipeline Directory Traversal Vulnerability Found by Orange Tsai Note: By default, Rails apps running in production mode are not vulnerable to this exploit Exploit: curl -v 127001:3000/assets/file:%2f%2f/usr/src/blog/app/assets/images/%252e%252e/%252e%252e/%252e%252e/config/secretsyml%3ftype=text/yaml

1 Ruby on Rails 路径穿越与任意文件读取漏洞(CVE-2018-3760) python cve-2018-360py ip